Hello again, reader. I’ll have to give you a name, a-la Late Night Live, won’t I? Just a brief follow on from my last post, and the earlier posts concerning my stalker, David William Nicholson Thiessen, contained therein. Y’know, it’s said about internet trolls….

A person whose sole purpose in life is to seek out people to argue with on the internet over extremely trivial issues. Such arguments can happen on blogs, Facebook, Myspace and a host of others. The best thing you can do to fight an internet troll is to not answer..or report them.

Now, I’m all in favour of starving a troll, but my very own personal stalker is a troll I actually enjoy having fun with. I’ve found that he’s a harmless sort, totally devoid of the killer instinct and deathly afraid of being unmasked, which I’ve done and will continue to do on Twitter, which seems to be his favoured playground at present. You see, he doesn’t realise that in seeking to defeat me (by what means escapes me) he has actually taught me more about himself than he can possibly imagine. I know who he is, what he is and where he lives. I know his personal telephone number and several of his business contacts. I also know he is a fragile personality type. Definitely introverted and judgemental, just like me. He’s also very clever with computer code and languages. He’s not very clever when it comes to social engagement or understanding his fellow human beings, which is where I have a distinct edge. You see, I’m like the elephant, I never forget. I also never lose. David clearly has, I’d say several times in his sad, pathetic life. Hence the need to get back at someone, anyone and his troll behaviour bears this out.

An SQL Injection Attack is simply a piece of coding which triggers MySQL to answer queries of it’s database, effectively enabling the attacker to both access the database and play around inside it. Similar, but different, to a Denial of Service attack. I know Thiessen has been playing around in this blog because it’s been receiving spam hits. It has NEVER received spam hits in the five-and-a-half years it’s been running. I use the usual code methods to keep spammers away. Clearly, my current host doesn’t have hard enough protection on their MySQL access paths. That’s okay, I can attend to that. In the meantime, I’ll simply do what I’ve been doing – go into the WordPress comment authorisation area and delete the spam. It’s a single click operation, no biggie.

BUT….the real score to me is the above posts on Twitter. A dead giveaway. Oh yes, he’ll deny everything and I know he’ll have routed his attacks via multiple proxy servers. Big deal. As I say, I can live with it until I get around to contacting the host. The real edge this gives me is his blatant transgression of Twitter rules. The above posts constitute a threat. Twitter rules clearly state:

Unlawful Use: You may not use our service for any unlawful purposes or in furtherance of illegal activities. International users agree to comply with all local laws regarding online conduct and acceptable content.

Clearly, Thiessen is advertising his illegal activities and equally clearly, he is making threats. I’m sure Twitter Support will just adore my next ticket.